Written by Veritech Administrator |
Thursday, 18 February 2010 09:39 |
This article describes how to configure the Open××× Server so that it authenticates from a Windows Active Directory Server as well as the local user database. Note that this process is separate to the Active Directory authentication system included with the Endian Proxy service.
Endian have released an article http://kb.endian.com/entry/64/ which describes LDAP authentication, however, that article is not precisely related to Active Directory. The following instructions pertain specifically to using an Active Directory (AD) back-end.
It isn't possible to configure AD authentication through the administration graphical interface. Instead, a file needs to be edited in the command-line First, enable the Open××× server on he Endian and ensure it works with local accounts. Edit the file: /var/efw/openvpn/settings (it is advisable to make a backup copy of this file first!) Add the following lines to this file:
LDAP_BIND_DN=cn=administrator,cn=Users,dc=domainname,dc=local This is an authorised user that can query the AD. Administrator works well here. The 'dc' parameters pertain to the Windows AD domain name. * Note: it's possible that your AD tree is different, and possibly users are not in the cn=Users subtree. In that case, you will need to adjust this string. A good tool to help determine your tree structure is the Softerra LDAP Browser tool.
LDAP_BIND_PASSWORD=administratorpassword This is the password for the user specified in LDAP_BIND_DN above.
LDAP_URI=ldap://192.168.1.1 This is the IP address of the Active Directory server.
LDAP_USER_BASEDN=cn=Users,dc=domainname,dc=local This is the tree in AD where the users reside. Including cn=Users allows the search to be quicker and locate only the relevant users. * Note: it's possible that your AD tree is different, and possibly users are not in the cn=Users subtree. In that case, you will need to adjust this string. A good tool to help determine your tree structure is the Softerra LDAP Browser tool.
LDAP_USER_SEARCHFILTER=(&(objectCategory=person)(objectClass=user)(SAMAccountName=%(u)s)) This is the search filter to locate users, and passes the username and password in the AD query.
Save the 'settings' file. Restart the open××× service (from the GUI) and connect using the Open××× client. More details on the file options are available at http://kb.endian.com/entry/64/ |
Last Updated on Thursday, 18 February 2010 09:56 |
How to Authenticate Open××× against Active Directory
精选 转载下一篇:CentOS 5 禁用 IPv6

提问和评论都可以,用心的回复会被更多人看到
评论
发布评论
相关文章
-
Windows Server 2025 Active Directory 新变化
自 Windows Server 2016以来,AD DS 尚未收到任何重大更新,并且 Server 2019/2022 中的功能级别没有增加。随着长期服务渠道 (LTSC)中操作系统的下一个版本的发布,该版本暂且被称为 Windows Server 2025。Windows Server 2025 新功能级别提升域或林的功能级别通常是为了利用相应服务器版本提供的新功能。ADDS 和轻量级域
Active Directory 新变化 Windows Server 2025 2025活动目录新内容 微软vNext 2025 AD DS -
Configuring a Squid Server to authenticate off Active Directory
Original work By Adrian ChaddUpdated by James Robertson 19.01.2012Updated by Christopher Schirner 11.11.2014 Warning: Any example presented here is provided "as-is" with no support or guarantee o
guarantee provided examples presented further -
Active Directory迁移
利用转发器:…然后利用工具:WIN2003的原版安装光盘里I386文件中的:的一个安装软件进行安装:安装完后会有相应:然后在到AD的管理控制台中新建用户,和组。。。。
活动目录 Active Directory 休闲 AD